Search Results

There are 26439 results for: content related to: An on-site digital investigation methodology for data leak case

  1. Virtual flow-net for accountability and forensics of computer and network systems

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2509–2526, Daisuke Takahashi, Yang Xiao and Ke Meng

    Version of Record online : 27 DEC 2011, DOI: 10.1002/sec.407

  2. Bot detection evasion: a case study on local-host alert correlation bot detection methods

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1277–1295, Brandon Shirley, Lokesh Babu and Chad Mano

    Version of Record online : 26 JAN 2012, DOI: 10.1002/sec.401

  3. Secure communication for the Internet of Things—a comparison of link-layer security and IPsec for 6LoWPAN

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2654–2668, Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig and Thiemo Voigt

    Version of Record online : 18 JAN 2012, DOI: 10.1002/sec.406

  4. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  5. A survey of security visualization for computer network logs

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 404–421, Yanping Zhang, Yang Xiao, Min Chen, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 11 MAY 2011, DOI: 10.1002/sec.324

  6. Secure data transmission with cloud computing in heterogeneous wireless networks

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1325–1336, Chung-Hua Chu, Yen-Chieh Ouyang and Chang-Bu Jang

    Version of Record online : 29 JAN 2012, DOI: 10.1002/sec.409

  7. Measuring the risk value of sensitive dataflow path in Android applications

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5918–5933, Pengbin Feng, Cong Sun and Jianfeng Ma

    Version of Record online : 19 JAN 2017, DOI: 10.1002/sec.1746

  8. How to protect security and privacy in the IoT: a policy-based RFID tag management protocol

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2669–2683, Evangelos Rekleitis, Panagiotis Rizomiliotis and Stefanos Gritzalis

    Version of Record online : 9 DEC 2011, DOI: 10.1002/sec.400

  9. A context-aware approach to defend against unauthorized reading and relay attacks in RFID systems

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2684–2695, Di Ma and Nitesh Saxena

    Version of Record online : 22 DEC 2011, DOI: 10.1002/sec.404

  10. On the realization of fuzzy identity-based identification scheme using fingerprint biometrics

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1312–1324, Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi and Swee-Huay Heng

    Version of Record online : 10 JAN 2012, DOI: 10.1002/sec.408

  11. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  12. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  13. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  14. Software-defined networking (SDN): a survey

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5803–5833, Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki Elbelrhiti Elalaoui

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1737

  15. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  16. Toward a flexible and fine-grained access control framework for infrastructure as a service clouds

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2730–2743, Bo Li, Jianxin Li, Lu Liu and Chao Zhou

    Version of Record online : 17 FEB 2015, DOI: 10.1002/sec.1216

  17. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  18. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  19. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  20. An energy-efficient and security aware route selection protocol for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2015–2038, Thaier Hayajneh, Razvi Doomun, Ghada Al-Mashaqbeh and Bassam J Mohd

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.915